Journal: IET Information Security

Volume 4, Issue 2

45 -- 48B. Wang. On the security of an identity-based proxy multi-signature scheme
49 -- 61Vesselin Velichkov, Vincent Rijmen, Bart Preneel. Algebraic cryptanalysis of a small-scale version of stream cipher Lex
62 -- 67Feng Hao, Peter Y. A. Ryan, Piotr Zielinski. Anonymous voting by two-round public discussion
68 -- 79Kun Wang, Meng Wu. Cooperative communications based on trust model for mobile ad hoc networks
80 -- 92Yoones Asgharzadeh Sekhavat, Mohammad Fathian. Mining frequent itemsets in the presence of malicious participants
93 -- 103Mitra Fatemi, Somayeh Salimi, Ahmad Salahi. Anonymous roaming in universal mobile telecommunication system mobile networks
104 -- 110Wenqiang Wang, Shaozhen Chen. Attribute-based ring signature scheme with constant-size signature